SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Angelbeat Seattle
WiFi
Agenda
• Accelops: Network Security
• Bradford: Endpoint Security/Network Access Ctrl:
• AVI: Load-Balancing/Application Performance
• Tegile: Flash Primary Storage
• Aerohive: WiFi/Mobility
• Netbeez: Network Analysis/Monitoring
• Google: Enterprise Cloud Services
• Microsoft: Cloud/Azure/Windows 10
• VMware: Software Defined Data Center/Enterprise
• No sales pitches
• “Tell Me Something New”
• No “We” or “I” – end user focus, not vendor
• Speaker evaluations very important
• Target: 50-60% highly-rated presentations
• Rate speakers based on how well they follow
presentation guidelines (available on website)
Speaker Guidelines/Evaluation
• Include Twitter hashtag #angelbeat in all Tweets
• Cell phones on vibrate
• Vendor discussions during break or outside
• Presentations downloadable
• Agenda will be followed to the minute
• Contact Angelbeat staff if you have any questions on
food, room temperature, room layout, audio-visual, etc.
Event Details
• Each vendor raffle must be entered separately
• All done at the end of day
• Must be present to win
• Each individual can win only twice
• Gift Cards and other great prizes
• All attendees receive $25 Amazon gift card from
Angelbeat, just stay til end of regular Microsoft talk
Raffle Prize Drawings
• Speakers receive attendee data post-seminar
• Contact Angelbeat to opt-out
• Reply back to post-event thank you email
• Whether you continue to opt-in or opt-out…
Please give sponsors fair consideration in future IT
spending decisions
Post Event Vendor Followup
• Follow us
• www.twitter.com/angelbeat
• www.youtube.com/angelbeat
• www.instagram.com/angelbeat
• www.facebook.com/angelbeat
• www.linkedin.com/groups/Angelbeat-
970047
Social Media #angelbeat
Network Access Control 101
Securing the Critical Edge of Your Network
Devices / Person
Internet of Things
Attack Surface is Growing and Changing
YOUR
BUSINESS
SUPPLIERS
PARENT
COMPANY
GUESTS
PARTNERS
CONSULTANTS
BYOD
INTERNET
OF THINGS
NO
AGENTS
USERS
Endpoints are Easy Targets for Hackers
Continually Assess Risk of Every Endpoint
About Bradford Networks
Live Inventory of Network Connections
Appliance / Virtual / Cloud
Analytics & Forensics
Network Access Policy Engine
1,000+ Customers
5 Star Rating from SC Magazine
30+ Countries
Gartner MQ Visionary
Consistent Mission for 15 Years
Firewall VPN IDS/IPS SIEM RouterSwitch Wireless
Access
Point
Visibility Control
Leverages the Network Infrastructure
SNMP
CLI
SNMP
CLI
Radius
SNMP
Syslog
API
SNMP
Syslog
API
RadiusSNMP
Syslog
API
SNMP
CLI
Radius
NAC 101:
Extensible Policy Engine
RISK?
RESTRICT NETWORK ACCESS
TRUST?
GRANT NETWORK ACCESS
INDICATORS OF
TRUST
NAC 101:
Leveraging Indicators of Trust/Risk
INDICATORS OF
RISK
NAC 101:
Live Inventory of Network Connections
WHEN
….
SITE 2
SITE N
SITE 1
WHERE
VPN
WHO WHAT
NAC 101:
Dynamic Network Provisioning
HEALTHCARE
RECORDS
ONBOARDING
PORTAL
GUEST
ACCESS
NO
ACCESS
WHO WHAT WHERE WHENINDICATOR OF
TRUST
NAC 101:
Endpoint Compliance / Network Segmentation
Identify
User
Assign
Network Access
Assess
Risk
Identify
Device
No
Access
Guest
Access
Restricted
Access
Unrestricted
Access
NAC 101:
Self-Service Registration
NAC 101:
Secure the Critical Edge of Your Network
CxO
• Embrace BYOD
• Balance Risk/Cost
• Maintain Compliance
Users
• Access They Need
• Flexibility They Want
• Privacy They Deserve
IT Management
• Safe Devices/Apps
• Trusted Users
• Safe Access
Taking Action …
Questions/Request Slides
NAC/BYOD Whitepaper
Network Security Best Practices
23 Proprietary and Confidential 2015
Avi and Modern SSL Security
24 Proprietary and Confidential 2015
IS CAUSING
HOW
TO MOVETO
25 Proprietary and Confidential 2015
Market Drivers for SSL Security
Google, Apple, others pushing PFS
• SSL is no longer good enough.
• iOS9 mandates apps connect via
TLS with Perfect Forward
Secrecy.
26 Proprietary and Confidential 2015
New SSL Requirements
SSL with and without Perfect Forward Secrecy
SSL SSL w/ PFS
27 Proprietary and Confidential 2015
SSL Offload on Load Balancers
Hardware versus software, appliance versus fabric
Proprietary Hardware Appliance Software Defined Network
Custom ASIC X86 CPUs
Fixed capacity, forklift upgrade Instant elastic capacity
ASICs lag years behind tech Easy to be current
= Software load balancing fabric
28 Proprietary and Confidential 2015
Load Balancer Implementation
The SDN Architecture
Internet
Data Center
Network
Appliance
SoftwareController
Management
SoftwareLoad Balancer
Data Plane
Software
29 Proprietary and Confidential 2015
Legacy Hardware versus Avi Load Balancer
Easy to implement modern security immediately.
Legacy hardware load balancer
• Cavium SSLASICs for SSL offload
• ASICs do not support PFS and cannot be used
• SSL must be performed on underpowered CPUs
• $500k load balancer can do 48k SSL PFS TPS
SoftwareAvi
Vantage
Avi load balancer
• Intel CPU for SSL offload
• Infinitely scalable capacity
• $50k servers plus Avi can do 100k SSL PFSTPS
30 Proprietary and Confidential 2015
Check out our booth for full Demonstrations
Self Service Provisioning Troubleshoot App Performance
o 30 Sec Load Balancer o App Health Score
o Scale Apps, not Complexity o One ClickTriage
o 100% REST Managed o Google-like Search vsTCPdump
Application Security VMware Integration
o Config Analyzer o vCenter Integration
o SSL Everywhere o Hybrid Cloud
o DDoS Attack Mitigation o Elastic Scale

Weitere ähnliche Inhalte

Was ist angesagt?

Recipe for good secrets management
Recipe for good secrets managementRecipe for good secrets management
Recipe for good secrets managementKevin Gilpin
 
Eric_Gales_Amazon_June_9_2017_presentation
Eric_Gales_Amazon_June_9_2017_presentationEric_Gales_Amazon_June_9_2017_presentation
Eric_Gales_Amazon_June_9_2017_presentationTriNimbus
 
Zenoss as a Service: How to Get There
Zenoss as a Service: How to Get ThereZenoss as a Service: How to Get There
Zenoss as a Service: How to Get ThereZenoss
 
Facebook Outage Analysis: Using External Visibility to Fortify Availability
Facebook Outage Analysis: Using External Visibility to Fortify AvailabilityFacebook Outage Analysis: Using External Visibility to Fortify Availability
Facebook Outage Analysis: Using External Visibility to Fortify AvailabilityThousandEyes
 
Making AI based monitoring a platform feature with the power of BOSH
Making AI based monitoring a platform feature with the power of BOSHMaking AI based monitoring a platform feature with the power of BOSH
Making AI based monitoring a platform feature with the power of BOSHVMware Tanzu
 
Putting the Sec into DevOps
Putting the Sec into DevOpsPutting the Sec into DevOps
Putting the Sec into DevOpsMaytal Levi
 
Algosec 5 more_things_you_can_do_with_a_security_policy_management_solution
Algosec 5 more_things_you_can_do_with_a_security_policy_management_solutionAlgosec 5 more_things_you_can_do_with_a_security_policy_management_solution
Algosec 5 more_things_you_can_do_with_a_security_policy_management_solutionMaytal Levi
 
Long Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkLong Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkSavvius, Inc
 
Engineering Manager, Edge Insights @Netflix
Engineering Manager, Edge Insights @NetflixEngineering Manager, Edge Insights @Netflix
Engineering Manager, Edge Insights @NetflixSangeeta Narayanan
 
Webinar: APPSeCONNECT Product Updates 2019 - Major Highlights
Webinar: APPSeCONNECT Product Updates 2019 - Major HighlightsWebinar: APPSeCONNECT Product Updates 2019 - Major Highlights
Webinar: APPSeCONNECT Product Updates 2019 - Major HighlightsAPPSeCONNECT
 
Leveraging the JSON API as a Self-Service Tool
Leveraging the JSON API as a Self-Service ToolLeveraging the JSON API as a Self-Service Tool
Leveraging the JSON API as a Self-Service ToolZenoss
 
QConSF 2014 - How we learned to stop worrying and start deploying the Netflix...
QConSF 2014 - How we learned to stop worrying and start deploying the Netflix...QConSF 2014 - How we learned to stop worrying and start deploying the Netflix...
QConSF 2014 - How we learned to stop worrying and start deploying the Netflix...Sangeeta Narayanan
 
Optimizing WAN to Deliver SharePoint Online Globally
Optimizing WAN to Deliver SharePoint Online GloballyOptimizing WAN to Deliver SharePoint Online Globally
Optimizing WAN to Deliver SharePoint Online GloballyThousandEyes
 
Gearing up for mobile push notifications
Gearing up for mobile push notificationsGearing up for mobile push notifications
Gearing up for mobile push notificationsKeith Moore
 
Making AI based monitoring a platform feature with the power of BOSH
Making AI based monitoring a platform feature with the power of BOSHMaking AI based monitoring a platform feature with the power of BOSH
Making AI based monitoring a platform feature with the power of BOSHMike Villiger
 
Secure Remote Access to AWS: Why OpenVPN & Jump Hosts Aren’t Enough
Secure Remote Access to AWS: Why OpenVPN & Jump Hosts Aren’t EnoughSecure Remote Access to AWS: Why OpenVPN & Jump Hosts Aren’t Enough
Secure Remote Access to AWS: Why OpenVPN & Jump Hosts Aren’t EnoughKhash Nakhostin
 
Monitoring End User Experience with Endpoint Agent
Monitoring End User Experience with Endpoint AgentMonitoring End User Experience with Endpoint Agent
Monitoring End User Experience with Endpoint AgentThousandEyes
 
How Aporeto Secures Cloud-native Across Public, Private, & Hybrid Clouds with...
How Aporeto Secures Cloud-native Across Public, Private, & Hybrid Clouds with...How Aporeto Secures Cloud-native Across Public, Private, & Hybrid Clouds with...
How Aporeto Secures Cloud-native Across Public, Private, & Hybrid Clouds with...DevOps.com
 
Transforming IT Ops - AWS Boston Meetup - Zenoss Presentation
Transforming IT Ops - AWS Boston Meetup - Zenoss PresentationTransforming IT Ops - AWS Boston Meetup - Zenoss Presentation
Transforming IT Ops - AWS Boston Meetup - Zenoss PresentationZenoss
 
CloudBrew 2017 - Security + DevOps + Azure = Awesomeness
CloudBrew 2017 - Security + DevOps + Azure = AwesomenessCloudBrew 2017 - Security + DevOps + Azure = Awesomeness
CloudBrew 2017 - Security + DevOps + Azure = AwesomenessKarl Ots
 

Was ist angesagt? (20)

Recipe for good secrets management
Recipe for good secrets managementRecipe for good secrets management
Recipe for good secrets management
 
Eric_Gales_Amazon_June_9_2017_presentation
Eric_Gales_Amazon_June_9_2017_presentationEric_Gales_Amazon_June_9_2017_presentation
Eric_Gales_Amazon_June_9_2017_presentation
 
Zenoss as a Service: How to Get There
Zenoss as a Service: How to Get ThereZenoss as a Service: How to Get There
Zenoss as a Service: How to Get There
 
Facebook Outage Analysis: Using External Visibility to Fortify Availability
Facebook Outage Analysis: Using External Visibility to Fortify AvailabilityFacebook Outage Analysis: Using External Visibility to Fortify Availability
Facebook Outage Analysis: Using External Visibility to Fortify Availability
 
Making AI based monitoring a platform feature with the power of BOSH
Making AI based monitoring a platform feature with the power of BOSHMaking AI based monitoring a platform feature with the power of BOSH
Making AI based monitoring a platform feature with the power of BOSH
 
Putting the Sec into DevOps
Putting the Sec into DevOpsPutting the Sec into DevOps
Putting the Sec into DevOps
 
Algosec 5 more_things_you_can_do_with_a_security_policy_management_solution
Algosec 5 more_things_you_can_do_with_a_security_policy_management_solutionAlgosec 5 more_things_you_can_do_with_a_security_policy_management_solution
Algosec 5 more_things_you_can_do_with_a_security_policy_management_solution
 
Long Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkLong Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and Splunk
 
Engineering Manager, Edge Insights @Netflix
Engineering Manager, Edge Insights @NetflixEngineering Manager, Edge Insights @Netflix
Engineering Manager, Edge Insights @Netflix
 
Webinar: APPSeCONNECT Product Updates 2019 - Major Highlights
Webinar: APPSeCONNECT Product Updates 2019 - Major HighlightsWebinar: APPSeCONNECT Product Updates 2019 - Major Highlights
Webinar: APPSeCONNECT Product Updates 2019 - Major Highlights
 
Leveraging the JSON API as a Self-Service Tool
Leveraging the JSON API as a Self-Service ToolLeveraging the JSON API as a Self-Service Tool
Leveraging the JSON API as a Self-Service Tool
 
QConSF 2014 - How we learned to stop worrying and start deploying the Netflix...
QConSF 2014 - How we learned to stop worrying and start deploying the Netflix...QConSF 2014 - How we learned to stop worrying and start deploying the Netflix...
QConSF 2014 - How we learned to stop worrying and start deploying the Netflix...
 
Optimizing WAN to Deliver SharePoint Online Globally
Optimizing WAN to Deliver SharePoint Online GloballyOptimizing WAN to Deliver SharePoint Online Globally
Optimizing WAN to Deliver SharePoint Online Globally
 
Gearing up for mobile push notifications
Gearing up for mobile push notificationsGearing up for mobile push notifications
Gearing up for mobile push notifications
 
Making AI based monitoring a platform feature with the power of BOSH
Making AI based monitoring a platform feature with the power of BOSHMaking AI based monitoring a platform feature with the power of BOSH
Making AI based monitoring a platform feature with the power of BOSH
 
Secure Remote Access to AWS: Why OpenVPN & Jump Hosts Aren’t Enough
Secure Remote Access to AWS: Why OpenVPN & Jump Hosts Aren’t EnoughSecure Remote Access to AWS: Why OpenVPN & Jump Hosts Aren’t Enough
Secure Remote Access to AWS: Why OpenVPN & Jump Hosts Aren’t Enough
 
Monitoring End User Experience with Endpoint Agent
Monitoring End User Experience with Endpoint AgentMonitoring End User Experience with Endpoint Agent
Monitoring End User Experience with Endpoint Agent
 
How Aporeto Secures Cloud-native Across Public, Private, & Hybrid Clouds with...
How Aporeto Secures Cloud-native Across Public, Private, & Hybrid Clouds with...How Aporeto Secures Cloud-native Across Public, Private, & Hybrid Clouds with...
How Aporeto Secures Cloud-native Across Public, Private, & Hybrid Clouds with...
 
Transforming IT Ops - AWS Boston Meetup - Zenoss Presentation
Transforming IT Ops - AWS Boston Meetup - Zenoss PresentationTransforming IT Ops - AWS Boston Meetup - Zenoss Presentation
Transforming IT Ops - AWS Boston Meetup - Zenoss Presentation
 
CloudBrew 2017 - Security + DevOps + Azure = Awesomeness
CloudBrew 2017 - Security + DevOps + Azure = AwesomenessCloudBrew 2017 - Security + DevOps + Azure = Awesomeness
CloudBrew 2017 - Security + DevOps + Azure = Awesomeness
 

Andere mochten auch

opciones de pegado
opciones de pegadoopciones de pegado
opciones de pegadoPamrn25
 
Herramientas informaticas
Herramientas informaticasHerramientas informaticas
Herramientas informaticasPamrn25
 
Herramientas informatica
Herramientas informaticaHerramientas informatica
Herramientas informaticaPamrn25
 
formato de texto word
formato de texto wordformato de texto word
formato de texto wordPamrn25
 
Peter Harper CV -( 2016 )
Peter Harper CV -( 2016 )Peter Harper CV -( 2016 )
Peter Harper CV -( 2016 )Peter Harper
 
Agregar notas-al-pie-y-notas-al-final
Agregar notas-al-pie-y-notas-al-finalAgregar notas-al-pie-y-notas-al-final
Agregar notas-al-pie-y-notas-al-finalPamrn25
 
Herramientas informaticas
Herramientas informaticasHerramientas informaticas
Herramientas informaticasPamrn25
 
Herramientas informaticas
Herramientas informaticasHerramientas informaticas
Herramientas informaticasPamrn25
 
Informatica grupal presentacion recomendaciones en power point
Informatica grupal presentacion recomendaciones en power pointInformatica grupal presentacion recomendaciones en power point
Informatica grupal presentacion recomendaciones en power pointPamrn25
 
Mantenimiento Mecanico
Mantenimiento MecanicoMantenimiento Mecanico
Mantenimiento Mecanicoangelh18
 

Andere mochten auch (14)

opciones de pegado
opciones de pegadoopciones de pegado
opciones de pegado
 
Google Desktop
Google DesktopGoogle Desktop
Google Desktop
 
Herramientas informaticas
Herramientas informaticasHerramientas informaticas
Herramientas informaticas
 
Herramientas informatica
Herramientas informaticaHerramientas informatica
Herramientas informatica
 
formato de texto word
formato de texto wordformato de texto word
formato de texto word
 
Exel
ExelExel
Exel
 
Peter Harper CV -( 2016 )
Peter Harper CV -( 2016 )Peter Harper CV -( 2016 )
Peter Harper CV -( 2016 )
 
Agregar notas-al-pie-y-notas-al-final
Agregar notas-al-pie-y-notas-al-finalAgregar notas-al-pie-y-notas-al-final
Agregar notas-al-pie-y-notas-al-final
 
Uso metabuscadores
Uso metabuscadoresUso metabuscadores
Uso metabuscadores
 
Herramientas informaticas
Herramientas informaticasHerramientas informaticas
Herramientas informaticas
 
Herramientas informaticas
Herramientas informaticasHerramientas informaticas
Herramientas informaticas
 
Excel
Excel Excel
Excel
 
Informatica grupal presentacion recomendaciones en power point
Informatica grupal presentacion recomendaciones en power pointInformatica grupal presentacion recomendaciones en power point
Informatica grupal presentacion recomendaciones en power point
 
Mantenimiento Mecanico
Mantenimiento MecanicoMantenimiento Mecanico
Mantenimiento Mecanico
 

Ähnlich wie SeattleFall1

Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...NetworkCollaborators
 
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudDeveloper Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudMicro Focus
 
Can Your Mobile Infrastructure Survive 1 Million Concurrent Users?
Can Your Mobile Infrastructure Survive 1 Million Concurrent Users?Can Your Mobile Infrastructure Survive 1 Million Concurrent Users?
Can Your Mobile Infrastructure Survive 1 Million Concurrent Users?TechWell
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdfssusera76ea9
 
Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Iftikhar Ali Iqbal
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale
 
Understanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM iUnderstanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM iPrecisely
 
Bridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the CloudBridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the CloudInside Analysis
 
Choosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to Avoid
Choosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to AvoidChoosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to Avoid
Choosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to AvoideG Innovations
 
Cisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud PlatformCisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud PlatformShashi Kiran
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021lior mazor
 
How to consolidate Citrix Monitoring in a Single Pane of Glass
How to consolidate Citrix Monitoring in a Single Pane of GlassHow to consolidate Citrix Monitoring in a Single Pane of Glass
How to consolidate Citrix Monitoring in a Single Pane of GlasseG Innovations
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the CloudAmazon Web Services
 
Why does Citrix use eG Enterprise for End-to-End Monitoring at Citrix Summit ...
Why does Citrix use eG Enterprise for End-to-End Monitoring at Citrix Summit ...Why does Citrix use eG Enterprise for End-to-End Monitoring at Citrix Summit ...
Why does Citrix use eG Enterprise for End-to-End Monitoring at Citrix Summit ...eG Innovations
 
IW14 Session: webMethods World
IW14 Session: webMethods WorldIW14 Session: webMethods World
IW14 Session: webMethods WorldSoftware AG
 
Service Virtualization: What Testers Need to Know
Service Virtualization: What Testers Need to KnowService Virtualization: What Testers Need to Know
Service Virtualization: What Testers Need to KnowTechWell
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Decisions
 
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocenceCisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocenceCisco Canada
 
Multi cloud webinar 2019 - slideshare
Multi cloud webinar 2019 - slideshareMulti cloud webinar 2019 - slideshare
Multi cloud webinar 2019 - slideshareThousandEyes
 

Ähnlich wie SeattleFall1 (20)

Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
 
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudDeveloper Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
 
Can Your Mobile Infrastructure Survive 1 Million Concurrent Users?
Can Your Mobile Infrastructure Survive 1 Million Concurrent Users?Can Your Mobile Infrastructure Survive 1 Million Concurrent Users?
Can Your Mobile Infrastructure Survive 1 Million Concurrent Users?
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdf
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the Cloud
 
Understanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM iUnderstanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM i
 
Bridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the CloudBridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the Cloud
 
Choosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to Avoid
Choosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to AvoidChoosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to Avoid
Choosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to Avoid
 
Cisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud PlatformCisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud Platform
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
 
How to consolidate Citrix Monitoring in a Single Pane of Glass
How to consolidate Citrix Monitoring in a Single Pane of GlassHow to consolidate Citrix Monitoring in a Single Pane of Glass
How to consolidate Citrix Monitoring in a Single Pane of Glass
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud
 
Why does Citrix use eG Enterprise for End-to-End Monitoring at Citrix Summit ...
Why does Citrix use eG Enterprise for End-to-End Monitoring at Citrix Summit ...Why does Citrix use eG Enterprise for End-to-End Monitoring at Citrix Summit ...
Why does Citrix use eG Enterprise for End-to-End Monitoring at Citrix Summit ...
 
IW14 Session: webMethods World
IW14 Session: webMethods WorldIW14 Session: webMethods World
IW14 Session: webMethods World
 
Service Virtualization: What Testers Need to Know
Service Virtualization: What Testers Need to KnowService Virtualization: What Testers Need to Know
Service Virtualization: What Testers Need to Know
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
 
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocenceCisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
 
Multi cloud webinar 2019 - slideshare
Multi cloud webinar 2019 - slideshareMulti cloud webinar 2019 - slideshare
Multi cloud webinar 2019 - slideshare
 

SeattleFall1

  • 2. Agenda • Accelops: Network Security • Bradford: Endpoint Security/Network Access Ctrl: • AVI: Load-Balancing/Application Performance • Tegile: Flash Primary Storage • Aerohive: WiFi/Mobility • Netbeez: Network Analysis/Monitoring • Google: Enterprise Cloud Services • Microsoft: Cloud/Azure/Windows 10 • VMware: Software Defined Data Center/Enterprise
  • 3. • No sales pitches • “Tell Me Something New” • No “We” or “I” – end user focus, not vendor • Speaker evaluations very important • Target: 50-60% highly-rated presentations • Rate speakers based on how well they follow presentation guidelines (available on website) Speaker Guidelines/Evaluation
  • 4. • Include Twitter hashtag #angelbeat in all Tweets • Cell phones on vibrate • Vendor discussions during break or outside • Presentations downloadable • Agenda will be followed to the minute • Contact Angelbeat staff if you have any questions on food, room temperature, room layout, audio-visual, etc. Event Details
  • 5. • Each vendor raffle must be entered separately • All done at the end of day • Must be present to win • Each individual can win only twice • Gift Cards and other great prizes • All attendees receive $25 Amazon gift card from Angelbeat, just stay til end of regular Microsoft talk Raffle Prize Drawings
  • 6. • Speakers receive attendee data post-seminar • Contact Angelbeat to opt-out • Reply back to post-event thank you email • Whether you continue to opt-in or opt-out… Please give sponsors fair consideration in future IT spending decisions Post Event Vendor Followup
  • 7. • Follow us • www.twitter.com/angelbeat • www.youtube.com/angelbeat • www.instagram.com/angelbeat • www.facebook.com/angelbeat • www.linkedin.com/groups/Angelbeat- 970047 Social Media #angelbeat
  • 8. Network Access Control 101 Securing the Critical Edge of Your Network
  • 11. Attack Surface is Growing and Changing YOUR BUSINESS SUPPLIERS PARENT COMPANY GUESTS PARTNERS CONSULTANTS BYOD INTERNET OF THINGS NO AGENTS USERS
  • 12. Endpoints are Easy Targets for Hackers
  • 13. Continually Assess Risk of Every Endpoint About Bradford Networks Live Inventory of Network Connections Appliance / Virtual / Cloud Analytics & Forensics Network Access Policy Engine 1,000+ Customers 5 Star Rating from SC Magazine 30+ Countries Gartner MQ Visionary Consistent Mission for 15 Years
  • 14. Firewall VPN IDS/IPS SIEM RouterSwitch Wireless Access Point Visibility Control Leverages the Network Infrastructure SNMP CLI SNMP CLI Radius SNMP Syslog API SNMP Syslog API RadiusSNMP Syslog API SNMP CLI Radius
  • 15. NAC 101: Extensible Policy Engine RISK? RESTRICT NETWORK ACCESS TRUST? GRANT NETWORK ACCESS
  • 16. INDICATORS OF TRUST NAC 101: Leveraging Indicators of Trust/Risk INDICATORS OF RISK
  • 17. NAC 101: Live Inventory of Network Connections WHEN …. SITE 2 SITE N SITE 1 WHERE VPN WHO WHAT
  • 18. NAC 101: Dynamic Network Provisioning HEALTHCARE RECORDS ONBOARDING PORTAL GUEST ACCESS NO ACCESS WHO WHAT WHERE WHENINDICATOR OF TRUST
  • 19. NAC 101: Endpoint Compliance / Network Segmentation Identify User Assign Network Access Assess Risk Identify Device No Access Guest Access Restricted Access Unrestricted Access
  • 21. NAC 101: Secure the Critical Edge of Your Network CxO • Embrace BYOD • Balance Risk/Cost • Maintain Compliance Users • Access They Need • Flexibility They Want • Privacy They Deserve IT Management • Safe Devices/Apps • Trusted Users • Safe Access
  • 22. Taking Action … Questions/Request Slides NAC/BYOD Whitepaper Network Security Best Practices
  • 23. 23 Proprietary and Confidential 2015 Avi and Modern SSL Security
  • 24. 24 Proprietary and Confidential 2015 IS CAUSING HOW TO MOVETO
  • 25. 25 Proprietary and Confidential 2015 Market Drivers for SSL Security Google, Apple, others pushing PFS • SSL is no longer good enough. • iOS9 mandates apps connect via TLS with Perfect Forward Secrecy.
  • 26. 26 Proprietary and Confidential 2015 New SSL Requirements SSL with and without Perfect Forward Secrecy SSL SSL w/ PFS
  • 27. 27 Proprietary and Confidential 2015 SSL Offload on Load Balancers Hardware versus software, appliance versus fabric Proprietary Hardware Appliance Software Defined Network Custom ASIC X86 CPUs Fixed capacity, forklift upgrade Instant elastic capacity ASICs lag years behind tech Easy to be current = Software load balancing fabric
  • 28. 28 Proprietary and Confidential 2015 Load Balancer Implementation The SDN Architecture Internet Data Center Network Appliance SoftwareController Management SoftwareLoad Balancer Data Plane Software
  • 29. 29 Proprietary and Confidential 2015 Legacy Hardware versus Avi Load Balancer Easy to implement modern security immediately. Legacy hardware load balancer • Cavium SSLASICs for SSL offload • ASICs do not support PFS and cannot be used • SSL must be performed on underpowered CPUs • $500k load balancer can do 48k SSL PFS TPS SoftwareAvi Vantage Avi load balancer • Intel CPU for SSL offload • Infinitely scalable capacity • $50k servers plus Avi can do 100k SSL PFSTPS
  • 30. 30 Proprietary and Confidential 2015 Check out our booth for full Demonstrations Self Service Provisioning Troubleshoot App Performance o 30 Sec Load Balancer o App Health Score o Scale Apps, not Complexity o One ClickTriage o 100% REST Managed o Google-like Search vsTCPdump Application Security VMware Integration o Config Analyzer o vCenter Integration o SSL Everywhere o Hybrid Cloud o DDoS Attack Mitigation o Elastic Scale

Hinweis der Redaktion

  1. 13
  2. How apps like Candy Crush are causing enterprises to move to modern architectures such as SDN.